Inflearn brand logo image
Inflearn brand logo image
Inflearn brand logo image
Security & Network

/

Computer Security

OAuth 2.0 Concepts and Principles Learned Through Practice, Hacking, and Security

We will take a closer look at the working principles through core theories and practices of the OAuth 2.0 protocol. And we will analyze the OAuth 2.0 protocol from the perspective of hacking and security.

(3.9) 8 reviews

267 learners

  • crehacktive
Penetration Testing
OAuth

Reviews from Early Learners

What you will learn!

  • OAuth Basic Concepts

  • How OAuth works

  • OAuth Practice

  • OAuth Hacking and Security

OAuth is widely used for simple/social login!
Learn everything from concepts to practical application in one lecture 🙌

Common Authorization Framework,
If you want to learn OAuth ! 📕

OAuth 2.0 protocol?

OAuth 2.0 authorization framework
Abbreviation for Open Authorization ,
About their information on other websites
An open standard for granting access rights.
It is currently being used and distributed in many web services.

What will I learn about the OAuth 2.0 protocol in this course? 📖

  • 1️⃣ Learn the basic concepts, background, operating principles, and key elements of the OAuth 2.0 protocol.
  • 2️⃣ Through hands-on practice, you can intuitively see how the OAuth 2.0 protocol works.
  • 3️⃣ You can also learn about security threats that may arise in the OAuth 2.0 protocol and how to prevent them from the perspective of a security expert or hacker.

The core of this lecture,
OAuth 2.0 Hacking and Security! 💣

You can examine the security threats that the OAuth 2.0 protocol may pose and learn in detail about various security methods.

For web developers and penetration testing experts alike 💻

Web developers implementing OAuth 2.0 will benefit from this course by becoming aware of the threats that exist.
A mock hacking expert will be able to diagnose which points and methods can be used in an environment where OAuth 2.0 is implemented, and what security measures can be taken.


With a systematic composition
More detailed and thorough 📌

We enhance your understanding through a detailed curriculum and PPT.

This step-by-step guide to OAuth protocol decomposition offers a much more in-depth and systematic approach than the OAuth-related knowledge widely available online. Furthermore, the PPT provides numerous tools to enhance learners' understanding, including detailed diagrams.


Improve your understanding through practice ✨

To understand OAuth, the theory alone is not enough.
You can perfect it with practice!

  • ✅ Reduce time spent on building a virtual environment and increase learning effectiveness through pre-made virtual environments!
  • ✅ Understand the code base OAuth operation process UP through code review!
  • ✅ Intuitive understanding of the operation process through analysis of request/response messages communicated through web proxy tools!

📢 No libraries! Implement the OAuth 2.0 protocol with pure PHP coding.

  • This course implements the OAuth 2.0 protocol using pure PHP coding , without using any OAuth 2.0 libraries. This is intended to enhance student understanding! If you're interested in learning how to use the OAuth library, please skip this course.

Provided only to students
Special materials,
OAuth 2.0 Security Checklist 📚

We're providing students with a security checklist for more effective OAuth 2.0 security audits! You can learn diagnostic methods and response strategies for each item in the "OAuth 2.0 Hacking and Security" course.


Average rating: 4.8★
Creative, a course you can trust and take 🏆

Thankfully, I have received many positive reviews of my lectures.
I believe this is the result of a lot of hard work put into creating each and every lecture! If you're hesitant about taking the course, trust me and take it!


Check out the Q&A 💬

Q. What basic knowledge would be helpful for taking this course?

It is recommended that you have some programming experience and have some basic knowledge of web technologies and web hacking.

Q. I am a web developer. Can I take the course?

Web developers already have basic web and programming knowledge, so they can easily take this course! If you need help with web hacking, the following courses will be of great help.

Q. Who will benefit from this course?

This course will be very helpful to both hacking experts and web developers, as it examines the OAuth 2.0 protocol from a hacking and security perspective.

Q. I am a job seeker or new employee in a security-related field. Will this be helpful for my work?

Of course, it helps! Many web services today use the OAuth 2.0 protocol. However, I recommend that you first take my other courses on web hacking and fully understand them before taking this course.

Q. I am a developer working on JAVA web application development. Will this be helpful?

You can use any language you like, but I chose PHP for its intuitiveness and ease of understanding the OAuth 2.0 protocol.

Q. Can I take the course even if I don't know PHP?

While a basic understanding of PHP is helpful, a basic understanding of programming is generally acceptable. This means that proficiency in languages other than PHP is also a plus.

Recommended for
these people

Who is this course right for?

  • Anyone developing OAuth

  • Simulated Hacking Expert

  • Web Developer

Need to know before starting?

  • Experience using programming languages

Hello
This is

25,760

Learners

1,345

Reviews

497

Answers

4.9

Rating

18

Courses

:: 국내 정보보안 솔루션 개발 기업 재직 ::
- 앱 위변조 방지 솔루션 : 미들웨어 담당 / 해킹 대회 운영진 / 국내 유명 해킹/방어 훈련장 제작

:: 국내 정보보안 전문 업체 재직 ::
- 블랙박스 모의해킹 / 시나리오 기반 모의해킹 / 웹 취약점 진단 / 모바일 취약점 진단 / 소스코드 취약점 진단 / APT 모의 훈련 / DDoS 모의훈련 / 인프라 진단 / 스마트 가전 진단
- 국내 대기업, 중소기업 다수 진단

:: 외부 교육 및 활동 ::
- 멀티캠퍼스, 국가 보안 기술 연구소(ETRI)
- 국내 정보보안 업체 : 재직자 대상 "웹 모의해킹 심화 교육" 진행중
- 해커팩토리 문제 제작

:: 취약점 발견 ::

1) Web Application Server 취약점
- TMAX JEUS : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)
- IBM WebSphere(CVE-2020-4163) : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)

2) CMS(Contents Management System) 취약점
- 네이버 스마트에디터 : 파일 업로드 취약점
- 그누보드 : SQL Injection , 파일 업로드 취약점(그누보드4, 그누보드5), XSS ...
- 킴스큐 : 파리미터 변조 취약점 , 파일 업로드 취약점

* 이메일 : crehacktive3@naver.com
* 블로그 : http://www.crehacktive.co.kr

Curriculum

All

69 lectures ∙ (8hr 15min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

8 reviews

3.9

8 reviews

  • Hackguri님의 프로필 이미지
    Hackguri

    Reviews 7

    Average Rating 5.0

    5

    100% enrolled

    좋은 강의 잘 들었습니다~ OAuth 2.0 에 대해서 이해하는데 도움이 많이 되었습니다.

    • 신용재님의 프로필 이미지
      신용재

      Reviews 1

      Average Rating 4.0

      4

      100% enrolled

      • 학습자님의 프로필 이미지
        학습자

        Reviews 10

        Average Rating 5.0

        5

        23% enrolled

        좋은 강의 감사합니다.

        • 우정민님의 프로필 이미지
          우정민

          Reviews 2

          Average Rating 4.5

          4

          100% enrolled

          개념을 잘 이해할 수 잇었습니다

          • 김한성님의 프로필 이미지
            김한성

            Reviews 2

            Average Rating 5.0

            5

            100% enrolled

            쉽고 간결한 설명

            $51.70

            crehacktive's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!